A Survey of Network Virtualization

Size: px
Start display at page:

Download "A Survey of Network Virtualization"

Transcription

1 A Survey of Network Virtualization N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada N2L 3G1 {nmmkchow, Technical Report: CS October 15, 2008 Abstract Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification once and for all, network virtualization has been propounded as a diversifying attribute of the future inter-networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate, network virtualization provides flexibility, promotes diversity, and promises security and increased manageability. In this paper, we present a network virtualization model with a set of quintessential design goals, survey the past and the state-of-the-art of network virtualization, and discuss the future challenges that must be addressed to realize a viable network virtualization model. 1 Introduction The Internet has been stunningly successful in modeling the way we access and exchange information in the modern world. Over the course of past three decades, the Internet architecture has proven its worth by supporting multitude of distributed applications and a wide variety of network technologies over which it currently runs. However, its popularity has become the biggest impediment to its further growth. Due to its multi-provider nature, adopting a new architecture or modification of the existing one requires consensus among competing stakeholders. As a result, alterations to the Internet architecture have become restricted to simple incremental updates instead of radical changes by introducing and deploying new network technologies [1, 2]. Even though architectural purists view network virtualization as a means for evaluating new architectures, the pluralist approach considers virtualization as a fundamental attribute of the architecture itself [1]. According to them, network virtualization can extenuate the ossifying forces of the current Internet and stimulate innovation by enabling diverse network architectures to cohabit on a shared physical substrate. To introduce diversity, separation of policy from mechanism is a well-tested principle in computing literature. Similar approach has been propounded for virtualizing networks [2, 3, 4]. In this case, the role of the traditional ISPs has been divided into two: infrastructure providers, who manage the physical infrastructure, and service providers, who create virtual networks by aggregating resources from multiple infrastructure providers and offer end-to-end services to the end users. Such an environment will foster deployment of multiple coexisting heterogeneous network architectures that are not bounded by the inherent limitations found in the existing Internet. This paper examines the past and the state-of-the-art in network virtualization and identifies key issues for future exploration. The rest of this article is organized as follows. In Section 2, we review three existing ideas: virtual private networks, programmable networks, and overlay networks, that are closely related 1

2 to the concept of virtual networks. Next, in Section 3, we present a reference business model of a network virtualization environment and identify critical design factors to materialize it. Following this, we summarize a number of past and present projects on network virtualization and related concepts in Section 4. In Section 5, we identify key research issues for further exploration based on our analysis of the surveyed work. We conclude in Section 6. 2 Historical Perspective The concept of multiple co-existing networks is not necessarily new. It appeared in the networking literature several times in the past in different capacities. In this section, we discuss three such incarnations that are closely related to the concept of network virtualization. A virtual private network, also known as a VPN, is a specialized virtual network that connects multiple distributed sites through tunnels over shared or public networks. An overlay network is yet another form of network virtualization which is typically implemented in the application layer, though various implementations at lower layers of the network stack do exist. It has been extensively used as a weak but effective tool to deploy new features and fixes in the Internet. Active and programmable networks, on the other hand, is a concept that enables customization of network elements based on service providers requirements. 2.1 Virtual Private Network (VPN) A virtual private network (VPN) [5, 6, 7] can be thought of as a dedicated communications network of one or more enterprises that are distributed over multiple sites and connected through tunnels over shared or public communication networks like the Internet. If all the sites in a VPN are owned by the same enterprise, the VPN is known as a corporate Intranet. And if the sites are owned by different enterprises, the VPN is known as an Extranet. Most of the VPNs in practice are examples of intranets that connect geographically distributed sites of large corporate enterprises. Each VPN site must contain one or more Customer Edge (CE) devices (e.g. hosts or routers). Each CE device is attached, via some sort of attachment circuit, to one or more Provider Edge (PE) routers. Routers in the SP s network that do not attach to CE devices are known as P routers. Normally a VPN is managed and provisioned by a VPN service provider (SP) and known as Provider-provisioned VPN (PPVPN) [8]. PPVPN technologies can be classified into three broad categories based on the protocol used in the VPN data plane: Layer 3 PPVPN The distinguishing feature of Layer 3 VPN (L3VPN) [9, 10] is the use of layer 3 protocols (e.g. IP or MPLS) in the shared network infrastructure (VPN backbone) to carry data between the distributed CEs. L3VPNs can again be classified into two categories: CE-based and PE-based VPNs. In the CE-based VPN approach, the shared service provider network does not have any knowledge of the customer VPN. CE devices create, manage, and tear up the tunnels. The SP network is completely unaware of the existence of a VPN and treats packets as normal IP packets. Tunneling requires three different protocols: 1. Carrier protocol (e.g. IP), used by the SP network to carry the VPN packets. 2. Encapsulating protocol, used to wrap the original data. It can range from very simple wrapper protocols (e.g. GRE [11], PPTP [12], L2TP [13]) to secure protocols (e.g. IPSec [14]). 3. Passenger Protocol, which is the original data in customer networks. Sender CE devices encapsulate the passenger packets and route them into carrier networks; when these encapsulated packets reach the end of the tunnels, i.e. receiver CE devices, they are extracted and actual packets are injected into receiver networks. On the other extreme, all the states in PE-based L3VPNs are maintained in the PE devices, and a connected CE device may behave as if it were connected to a private network. In this case, the PE devices know that certain traffic is VPN traffic and they process that accordingly. When a PE-based VPN maintains 2

3 a complete logical router with unique forwarding table and unique routing protocol set for each VPN, it is known as Virtual Router PPVPN. If a single BGP instance is shared between VPNs, with separate forwarding environment and a separate forwarding table for each of them, it is known as BGP/MPLS IP VPN [7]. In this case route advertisements are marked with attributes to identify their VPN context Layer 2 VPN Layer 2 VPNs (L2VPNs) [15, 16] transport Layer 2 (typically Ethernet but also ATM and Frame Relay) frames between participating sites. The advantage of L2VPN is that it is agnostic to the higher-level protocols and simpler. But the disadvantage is that there is no control plane to manage reachability across the VPN. There are two fundamentally different kinds of Layer 2 VPN services that a service provider could offer to a customer: Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). There is also the possibility of an IP-only LAN-like Service (IPLS). A VPWS is a VPN service that supplies an L2 point-to-point service. A VPLS is a point-to-multipoint L2 service that emulates LAN service across a WAN. And an IPLS is similar to VPLS except that CE devices are hosts or routers instead of switches and only IP packets are carried either IPv4 or IPv Layer 1 VPN Accompanied by the rapid advances in next-generation SONET/SDH and optical switching along with GMPLS [17] control, the Layer 1 VPN (L1VPN) [18, 19] framework emerged from the need to extend L2/L3 packet-switching VPN concepts to advanced circuit-switching domains. It enables multiple virtual client-provisioned transport networks over a common layer 1 core infrastructure. The fundamental difference between L1VPNs and L2 or L3 VPNs is that in L1VPNs, data plane connectivity does not guarantee control plane connectivity (and vice versa). But CE-PE control plane connectivity is required for L1VPN services provisioned through the control plane, and CE-CE data plane connectivity is maintained by signaling mechanisms based on this control plane connectivity. The main characteristics of L1VPN is that it provides a multi-service backbone where customers can offer their own services, whose payloads can be of any layer (e.g., ATM, IP, TDM). This ensures that each of the service networks have independent address space, independent layer 1 resource view, independent policies and complete isolation from other virtual networks. L1VPN can be of two types: Virtual Private Wire Services (VPWS) and Virtual Private Line Services (VPLS). VPWS services are point-to-point, while VPLS can be point-to-multipoint. 2.2 Active and Programmable Networks The need to create, deploy and manage novel services on the fly in response to user demands was the key driving factor behind the uprise of programmable networks research. To enable on-demand services, the separation of communications hardware from control software is a fundamental requirement. If that separation is in place, software can be programmed irrespective of the underlying hardware to deliver necessary functionalities. Programmable networking community discusses on how this separation can be achieved. The authors in [20] present a survey of programmable networks along with a generalized programmable networking model, where programmability is achieved by introducing computation inside the network and by extending the amount and scope of computation performed in existing routers and switches. Collectively, the computation and communication models make up a programmable network, allowing a network architect to program individual layers across the transport, control and management planes. The computation model is realized by a set of distributed node kernels and network programming environment. The node kernel represents the lowest level of programmability, providing a small set of node interfaces supporting the manipulation of node states. Network programming environments support the construction of networks enabling dynamic deployment of network services and protocols. They offer a set of open interfaces and services to network designers to program customized network architecture. Two separate schools of thought emerged on how to actually implement this concept; one from telecommunications community and the other from IP networks community. 3

4 2.2.1 Open Signaling Approach (Opensig) Open signaling [21] takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize on QoS guarantees for created services. It argues for modeling communication hardware using a set of open programmable network interfaces, thereby enabling open access to switches and routers by third party software providers. It creates an abstraction layer for physical network devices to act as distributed computing objects with well-defined open programming interfaces, which allow service providers to manipulate the network states Active Networks Approach (AN) Active networks [22, 23, 24, 25] community promotes dynamic deployment of new services at runtime within the confinement of existing networks. These networks are active in the sense that routers or switches can perform customized computations based on the packet contents and can also modify them. Active networks approach allows customization of network services at packet transport granularity instead of doing so through a programmable control plane; hence, it offers more flexibility than Opensig approach at the cost of more complex programming model. Different levels of programmability have been suggested over the years. At one end, ANTS [26] offers a Turing-complete machine model at the active router enabling each user to execute any new code. At the other end of the spectrum, DAN [27] only allows the user to call functions already installed at a particular node. Calvert et al. [28] classify the proposed architectures based on the granularity of control, statefullness, and language expressive power. 2.3 Overlay Networks An overlay network is a virtual computer network which creates a virtual topology on top of the physical topology of another network. Nodes in an overlay network are connected through virtual links which may correspond to a path, connected by multiple physical links in the underlying network. Overlays are not geographically restricted and participation is completely voluntary. Since participants voluntarily lend their resources to the network, overlays do not typically involve significant expenditures. Moreover, they are flexible and adaptable to changes and easily deployable in comparison to any other network. As a consequence, overlay networks have long been used to deploy new features and fixes in the Internet. A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [29] and availability [30] of Internet routing, enabling multicasting [31, 32, 33], providing QoS guarantees [34], protecting from denial of service attacks [35, 36], and for content distribution [37], file sharing [38] and even in storage systems [39]. The Detour [29] study noted that re-routing packets through virtual tunnels could often improve endto-end performance in terms of loss, latency and throughput, than the direct Internet path. The Resilient Overlay Network (RON) [30] project experimentally showed that an overlay network that performs its own network measurements can provide fast recovery from failure and improved latency and loss-rates even over short time-scales. The overlay-based Internet Indirection Infrastructure (i3) [40] aims to simplify network services deployment and management by decoupling the acts of sending and receiving. In i3, sources send packets to a logical identifier and receivers express interest in packets sent to an identifier. This additional level of indirection allows for more flexibility in node mobility and in service location and deployment. In all three cases, routing performance of the Internet is strengthened by introducing an overlay on top of the existing routing substrate. Routing as a Service [41] introduces third party Routing Service Providers (RSPs) that buy virtual links from different ASes connecting some number of virtual routers. Hosts desiring customized routes contract with an RSP, which would then set up an appropriate end-to-end overlay path along its virtual links based on the global view of the topology. This idea of introducing third party providers is particularly of interest here. OverQoS [34] provides a mechanism to establish overlay links with certain loss and delay guarantees. Service Overlay Network (SON) [42] is designed to use overlay technique to provide value-added Internet services. A SON can purchase bandwidth with certain QoS guarantees from different ISPs to build a logical end-to-end service delivery overlay. 4

5 (a) Relationship between Players (b) Hierarchy of Roles Figure 1: Network Virtualization Business Model Most importantly, overlays have been used as testbeds. PlanetLab( 4.5.1) is such an example. With the advent of PlanetLab, researchers can easily create and manage customized environments to design and evaluate new architectures, protocols, and algorithms. However, Anderson et al. [1] point out that standard overlays falter as a deployment path for radical architectural innovation in at least two ways. First, overlays have largely been seen as a way to deploy narrow fixes to specific problems without any holistic view of the interactions between different overlays. Second, most overlays have been designed in application layer on top of IP and hence are not capable of supporting radically different concepts. 3 Network Virtualization Environment (NVE) Based on the pluralist approach, we define network virtualization as an integral part of the diversified Internet architecture, which supports multiple coexisting heterogeneous network architectures from different service providers, sharing a common physical substrate managed by multiple infrastructure providers. By decoupling service providers from infrastructure providers, network virtualization introduces flexibility for innovation and change. In this section, we present a conceptual view of the network virtualization architecture along with a reference business model and identify the principal design factors to materialize the architecture. 3.1 Reference Business Model Players in the network virtualization model (Figure 1(a)) are different from those in the traditional networking model. The main distinction is the presence of two different roles: infrastructure providers and service providers, which are represented by a single role: Internet Service Provider (ISP) in the conventional model [2, 3, 4]. From a commercial point of view, this decoupling amortizes high fixed cost of maintaining a physical presence by sharing capital and operational expenditure across multiple infrastructure providers. It should be noted that business roles do not necessarily map one-to-one to distinct business entities (i.e., any business entity can assume multiple roles) Infrastructure Provider Infrastructure providers (InPs) deploy and actually manage the underlying physical network resources in the network virtualization environment. They are in charge of the operations and maintenance of the physical 5

6 infrastructure and offer their resources through programmable interfaces to different service providers. They do not offer direct services to end users. Infrastructure providers distinguish themselves through the quality of resources they provide, the freedom they delegate to their customers (i.e. service providers), and the tools they provide to exploit that freedom. Infrastructure providers communicate and collaborate among themselves, based on specific agreements, to create the complete underlying network. Those offering connectivity to service providers through different networking technologies, e.g. optical fiber, or satellite, are known as the facilities providers. On the other hand, Infrastructure providers connecting customer premise equipments (CPEs) to the network are the access providers [3] Service Provider Service providers (SPs) lease resources from multiple facilities providers to create virtual networks and deploy customized protocols by programming the allocated network resources to offer end-to-end services to the end users. A service provider can also create child virtual networks by partitioning its resources. It can then lease those child networks to other service providers, practically taking the role of an infrastructure provider creating a hierarchy of roles (Figure 1(b)) End User End users in the network virtualization environment are similar to the end users in the existing Internet, except that the existence of multiple virtual networks from competing service providers enables them to choose from a wide range of services. Any end user may connect to multiple service providers for different services. End users are the target recipients of the services provided by the SPs. Services are offered on the basis of terms and conditions on behalf of both the SPs and the customers Broker Brokers play a pivotal role in the network virtualization economy. They act as mediators between infrastructure providers, service providers, and end users in the network virtualization marketplace. Service providers buy (lease) resources from infrastructure providers to create virtual networks and sell services deployed on those virtual networks to interested end users through brokers. Their presence simplify the process of matching service providers requirements to available resources by aggregating offers from multiple infrastructure providers. Similarly, they also allow end users to select desirable services from a wide range of service providers. 3.2 Architecture In the network virtualization environment (NVE), the basic entity is a virtual network (VN). Each virtual network is composed and managed by a single service provider. It is a collection of virtual nodes connected together by a set of virtual links forming a virtual topology. Once provisioned a virtual network has the semblance of an actual physical network. Figure 2 depicts two possibly heterogeneous virtual networks VN1 and VN2 created by service providers SP1 and SP2, respectively. SP1 composed VN1 on top of the physical resources managed by two different infrastructure providers InP1 and InP2, and provides end-to-end services to the end users U2 and U3. SP2, on the other hand, deployed its virtual network VN2 by combining resources from infrastructure provider InP1, with a child virtual network from service provider SP1. End users U1 and U3 are connected through VN2. The owner of a virtual network is free to implement end-to-end services by selecting custom packet formats, routing protocols, forwarding mechanisms, as well as control and management planes. End users can opt-in to any virtual network. For example, end user U3 is subscribed to both VN1 and VN Concepts Here we formally define the common terminologies and notations that frequently appear to describe or refer to the different aspects of a network virtualization architecture. 6

7 Figure 2: Network Virtualization Architecture Physical Topology A weighted undirected graph G P = (V P, E P ), where each node in the network is a vertex v P V P, with a set of attributes A vp. Similarly, each physical link between two nodes is represented by an edge e P E P, with corresponding set of attributes A ep. Virtual Topology Another weighted undirected graph G V = (V V, E V ), where V V is the set of virtual nodes and E V is the set of virtual links. It is also known as logical topology. Virtual nodes, v V and virtual links, e V also have their corresponding set of attributes A vv and A ev respectively, that are provided by the service provider when placing a request for a virtual network. Virtual Node A virtual node can either be a virtual host or a virtual router. A virtual host act as a packet source or a sink and is never located inside the network. A virtual router, on the other hand, acts in the same way as a router in the physical network. Its main functionality is to forward packets according to the protocols of that virtual network. Virtual Link An edge, e V E V, in the virtual network that may span over one or more connected physical links i.e. a path in the underlying physical topology. As mentioned earlier, e V has a set of attributes A ev that characterize it. Bandwidth, delay, loss etc. are the examples of attributes of a virtual link. Concurrence Concurrence of virtual networks means that multiple virtual networks from different service providers can coexist together, spanning over part or full of the underlying physical networks provided by one or more infrastructure providers. VN1 and VN2 in Figure 2 are examples of concurrent virtual networks. To put it simply, an infrastructure provider might cater to multiple service providers and a service provider might use resources from different infrastructure providers. Recursion While virtual networks can be concurrent, in some cases, it might also be necessary to create and maintain one or more virtual networks within another virtual network creating a virtual network hi- 7

8 erarchy with parent-child relationship. This is known as recursion as well as nesting of virtual networks. In Figure 1(b), Service Provider 0 has created a virtual network on top of an actual physical network provided by Infrastructure Provider 0, and has leased away a portion of the allocated resources to Service Provider 1, to whom it appears as Infrastructure Provider 1. This hierarchical construct can continue until cumulative overhead of creating child virtual networks makes further subdivision impossible. Inheritance Child virtual networks, i.e. networks derived from other networks, can inherit architectural components from their parents. Also, constraints on a parent virtual network automatically translate to similar constraints on its children. In Figure 2, constraints due to InP2 will automatically be transferred to SP2 from SP1 through inheritance. Revisitation Revisitation allows a physical node in the underlying infrastructure to host multiple virtual nodes of a single virtual network. Use of multiple logical routers to handle diverse functionalities in a complex network can be a great relief for network operators. It can also be useful for creating testbed networks. In Figure 2, we can see an illustration of revisitation in VN Design Goals The overall goal of enabling multiple heterogeneous virtual networks to coexist together on a shared physical infrastructure can be subdivided into several smaller objectives. We believe that in order to materialize the proposed architecture, each of these design goals must be fulfilled. These goals also provide a guideline to design a protocol or an algorithm for virtual networks. In addition, they can also be used to compare multiple network virtualization schemes Flexibility Network virtualization must provide flexibility at every aspect of networking. Each service provider should be able to use arbitrary network topology, routing or forwarding functions as well as customized control protocols independent of the underlying physical network and other coexisting virtual networks. For example, deploying source routing in today s Internet is immensely difficult because of the lack of consensus among the ISPs; in a virtualized environment, the owner of a virtual network should be able to offer source routing without having to coordinate with any other parties Manageability By separating service providers from infrastructure providers, network virtualization will modularize network management tasks and introduce accountability at every layer of networking [4, 43, 44, 2]. Infrastructure providers will be in total control of the management and operations of physical entities in the network and provide access to resources. Whereas, service providers will lease subsets of resources from different infrastructure providers, create virtual networks on top of the allocated resources following specific policies, and provide actual services to end users. This separation of accountability will provide complete, end-to-end control of the virtual networks to the service providers obviating the requirement of coordination across administrative boundaries as seen in the existing Internet Scalability Coexistence of multiple networks is one of the fundamental motivations behind network virtualization. Scalability comes as an indispensable part of this equation. Optimally, there should be as many virtual networks as the underlying infrastructure can manage resource for. But due to conflicting requirements and different constraints it might not be possible to accommodate so many of them in practice. Infrastructure providers should try to maximize the number of coexisting virtual networks without degrading performance of any one of them. This will increase utilization of resources and amortize capital expenditure (CAPEX) and operational expenditure (OPEX) of individual virtual networks. 8

9 3.3.4 Isolation, Security, and Privacy Network virtualization must provide isolation (both logical and resource) between different co-existing virtual networks, which will result in networks that are resilient to faults and attacks. Failure or security breach in one virtual network should not be able to affect another. Also the risk involved in carrying untrusted services and applications along with confidential information can be reduced by using separate virtual networks for each of them. Network protocols are often misconfigured and are subject to implementation bugs. Virtualization will ensure that misconfigurations or bugs in one network do not hamper the operations of another Programmability To make virtual networks flexible and manageable, programmability of the network elements is of utmost importance. Only through programmable network elements, it will be possible for the service providers to implement customized protocols and deploy diverse services. Hence, the design decisions: how much programmability should be allowed, and how it should be exposed must have satisfactory answers. Once again the disagreement between the active networks community and the open programmable networks community becomes eminent. We must find a win-win situation where programmability will be easy, effective, as well as secure at the same time Heterogeneity Heterogeneity in the context of network virtualization comes from two fronts. First, heterogeneity of the underlying networking technologies (e.g., optical, wireless, sensor etc.). Since each networking technology has its unique characteristics, enabling virtualization in each of them call for different solutions. Second, each end-to-end virtual network, created on top of that heterogeneous combination of infrastructure networks, can also be heterogeneous. Service providers must be allowed to compose and run end-to-end virtual networks without any restrictions and across multiple domains without the need for technology specific solutions. Moreover, underlying infrastructures must be capable of supporting heterogeneous protocols and algorithms implemented by different service providers. In addition, heterogeneity of end user devices must also be taken into account Experimental and Deployment Facility Before deployment, any geographically distributed network service is typically designed and evaluated in test labs under controlled environment. Since it is very expensive to mimic a production network, tests are limited to simple topologies and traffic patterns that do not necessarily represent the real-world environment. Moreover, migration of a network to a different condition can also be extremely painstaking. By developing the service in a separate virtual network from the very beginning can effectively alleviate these problems. In addition, deploying new end-to-end services could not be more easier than deploying it on a separate virtual network of its own [45, 46] Legacy Support Legacy support or backward compatibility has always been a matter of deep concern while deploying any new technology. In fact, the biggest impedance against a complete makeover of the current Internet is the fear of losing all the advancements we have had in last three decades. Network virtualization must be able to replace the existing Internet without breaking it. Theoretically, network virtualization can easily integrate legacy support by considering the existing Internet as just another virtual network into its collection of networks. This will ensure that the existing distributed applications, services, and technologies need not be changed and redeveloped overnight; instead, we can keep using them until their counterparts are available or they are ported to the newer networks. For example, use of IPv6 would have been much faster if it could be implemented in another virtual network without having to deal with the preeminent IPv4. 9

10 4 Network Virtualization Projects The term virtual networks has been extravagantly used by different research groups to describe their works on virtual private networks, overlay networks, and active or programmable networks. Until recently, very few of them actually followed the pluralist view of network virtualization. In this section, we survey a number of virtual network architectures and related projects (e.g. overlay, programmable network or VPN inspired designs) that have emerged in the literature. We categorize the projects based on a set of characteristics and select a representative project for each characteristic. At the end of the section, we summarize the surveyed projects in Table Characteristics In the motley of multifarious designs, one can observe a set of characteristics that govern the construction of different network virtualization architectures by careful examination. We use the following characteristics to better understand the already crowded field: Networking technology Layer of virtualization Architectural domain Level of virtualization 4.2 Networking Technology A handful of network virtualization prototypes have been designed targeting specific networking technologies. The motivation behind these projects is to exploit unique characteristics of these networks to enable virtualization. We consider two representative projects enabling virtualization in IP and ATM networks IP: X-Bone The X-Bone [47] was first proposed as a system for the rapid, automated deployment and management of overlay networks using encapsulation to enable virtual infrastructure. Later this idea was extended to the concept of Virtual Internet (VI) [48], which is an IP network composed of tunneled links among a set of virtual routers and hosts, with dynamic resource discovery, deployment, and monitoring support. The VI virtualizes all the components of the Internet: hosts, routers and links between them. A single network node may participate as virtual host (VH), virtual router (VR) or multiple of them simultaneously in a VI. VHs act as data sources and sinks, while VRs act as data transits. Virtual links are part of VI deployment and VIs use IP in IP encapsulation [49] to transmit data through these links and thus avoid the need for new, non-ubiquitous protocol support. All components participating in the VI must support multihoming, since even a base host with a single VH is necessarily a member of at least two networks the Internet and the VI overlay. VIs completely decouple underlying physical network from the overlays and support concurrence and recursion as well as revisitation. Recursion is supported in two forms: control recursion and network recursion. Control recursion allows divide-and-conquer network management. And network recursion is true stacking of a VI on another VI, where packets on the uppermost VI have additional layers of header information when traversing inside the upper VI. Support for revisitation requires that Internet hosts and routers support forwarding based on the incoming interface, as well as packet header [50]. Addresses within each VI is unique and can be reused in another overlay, unless there is no shared common node in the underlying network between the two VIs. The addresses are managed by separate entity that is used in deployment of overlays. Recently, P2P-XBone [51], a peer-to-peer based fusion of X-Bone, was proposed to enable dynamic join/leave of participating nodes from a VI. It also allows creation and release of dynamic IP tunnels, and customized routing table configuration. 10

11 4.2.2 ATM: Tempest The Tempest [52] is a network control architecture that allows multiple heterogeneous control architectures to run simultaneously over single physical ATM network. It is defined as a set of policies, algorithms, mechanisms, and protocols to control and manage various devices on the network following the open signaling ( 2.2.1) school of thought of network programmability. It is based on the concept of switchlets [53], which allows a single ATM switch to be controlled by multiple controllers by strictly partitioning the resources of that switch between those controllers. The set of switchlets that a controller or group of controllers possess forms its virtual network. Third parties can lease such virtual networks from the Tempest network operator to use them for any purpose as they see fit. The Tempest supports programmability at two levels of granularity. First, switchlets support the introduction of alternative control architectures in the network. Second, services can be refined by dynamically loading programs into the network that customize existing control architectures. This allows the users to have application-specific control. And the association between user defined control policy and the allocated network resources is known as connection closure. The basic components of the Tempest are as follows: first, a control architecture communicates with a switch independent control interface Ariel. Then it goes to the Prospero switch divider, which logically divides an ATM switch into switchlets and assigns resources to the client. There is an SNMP based switch management interface, Caliban, that provides basic functionalities to manage the switchlets. A basic bootstrapping virtual network is provided for the components to interact between themselves to create the actual virtual network. Afterward, network builder creates the topology of the virtual network based on a given specification. Network builder is also responsible for the modification and maintenance of virtual networks. And finally, the Hollowman control architecture [54] provides an out-of-band signaling mechanism for communication between ATM enabled workstations to devolve control from the ATM switches into an application level distributed processing environment. 4.3 Layer of Virtualization Different research groups have considered virtualizing different layers of the network stack, starting from the physical layer and continuing up to the application layer. We summarize four such projects in the following Physical Layer: UCLP UCLP [55] is a distributed network control and management system for CA*NET 4 network that allows end users to treat network resources as software objects, and lets them provision as well as dynamically reconfigure optical networks (layer 1). Users are able to join or divide lightpaths within a single domain, or across multiple independent management domains to create customized logical IP networks, also known as Articulated Private Networks (APNs). Furthermore, users can publish complete or partial network resources allocated to them for the availability of other users. UCLP takes a modular approach toward resource management by introducing the concept of three distinct service layers [56, 57, 58]: User access, Service provisioning, and Resource management layers. The service provisioning layer is managed with a grid application. Customers and administrators configure and use end-to-end UCLP resources through the user access layer. Resource management layer deals with actual physical resources. UCLPv1.4 [59] introduced dynamic topology discovery process and enabled auto-routing through intelligent algorithms alongside already available manual lightpath configuration capabilities. Later, UCLPv2 [60] extended UCLP with the use of Service Oriented Architecture (SOA) and workflow technologies with an aim to form the underpinning architectural framework for extending UCLP to allow the interconnection of instruments, time slices, and sensors; and for incorporating virtual routers and switches Link Layer: VNET VNET [61, 62] is a layer 2 overlay network for virtual machines (VMs) that implements a virtual LAN (VLAN) spread over a wide area using layer 2 tunneling protocol (L2TP). Using VNET, VMs have no network presence at all on a remote site. Instead, VNET ensures that a distributed collection of VMs 11

12 each maintain a network presence on a given LAN. As a result, the management process is concerned with managing VMs present in the same LAN, instead of dealing with heterogeneous management policies of different sites. Each physical machine hosting a VM runs a VNET process that intercepts VM traffic and tunnels it to the appropriate destination. The destination is either another VM that can be contacted directly through VNET or an address external to the overlay. Traffic destined for an external address is routed through the overlay to a VNET proxy node, which is responsible for injecting the packets onto the appropriate network. The overlay thus consists of a set of TCP connections or UDP peers (VNET links) and a set of rules (VNET routes) to control routing on the overlay. Since VNET operates at layer 2, it is agnostic to layer 3. As a result, protocols other than IP can be used. Furthermore, MAC address of a VM s virtual Ethernet adapter and the LAN it appears in are kept fixed for the lifetime of that VM. As a result, a VM can be migrated from one machine to another without any participation from the VM s OS and all connections remain open after migration Network Layer: AGAVE The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously defined, but never implemented, QoS forwarding mechanisms such as IntServ [64] and DiffServ [65]. To achieve this, it proposes a new inter-domain architecture based on the novel concept of Network Planes (NPs), which will allow multiple IP Network Providers (INPs) to build and provide Parallel Internets (PIs) tailored to end-to-end service requirements. AGAVE specifies an open connectivity provisioning interface to allow Service Providers (SPs) to interact with underlying INP(s) infrastructure for the provision of their IP-based services. AGAVE introduces the concept of NPs to differentiate the delivery behaviors experienced by IP flows when crossing an IP realm managed by a single INP. NPs are internal to INPs and are created based on the service requirements described by the SPs. An NP can be engineered for routing, forwarding or resource management. To enable end-to-end services over multi-provider environment, NPs from different INPs are connected together to form PIs based on inter-inp agreements. One of the interesting feature of AGAVE is that it does not require all the NPs participating in a PI to be homogeneous resulting in greater flexibility. AGAVE replaces node-centric provisioning / configuration approach in favor of a more centralized network-based configuration, which ensures configuration consistency between participating INPs and reduces misconfiguration errors. Also, it supports an NP emulation function that assesses the status of the network and evaluates the impact of introducing new NPs before accepting new IP-connectivity provisioning requests Application Layer: VIOLIN VIOLIN [66, 67] is an application-level virtual network architecture, where isolated virtual networks are created in software on top of an overlay infrastructure(e.g. PlanetLab( 4.5.1)). Capitalizing on the advances in virtual machine (VM) technologies [68, 69, 70], VIOLIN extends the idea of single node isolation in VMs to provide completely isolated virtual networks. A VIOLIN consists of virtual routers (vrouters), LANs (vlans) and end hosts (vhosts), all being software entities hosted by overlay hosts. Both vhosts and vrouters are virtual machines running in physical overlay hosts. A vlan is created by connecting multiple vhosts using virtual switches (vswitches), while vrouters connect multiple vlans to form the total network. All VIOLIN entities are implemented as virtual machines in overlay hosts. User-Mode Linux(UML) [70], an user-space implementation of Linux, is used as the VM technology. UML s virtual NICs and virtual links are limited within the same host; so a nontrivial extension using UDP tunneling is implemented to connect VMs in different hosts. A vswitch is created for each vlan and all the hosts in that vlan open UDP tunnels to get connected together. vrouters are similar to vhosts except that they can forward packets and enforce different routing policies. VIOLIN provides network isolation with respect to 1) administration, 2) address space and protocol, 3) attack and fault impact, and 4) resources. The combined effect is a confined, secured, and dedicated environment that can be used to deploy untrusted distributed applications and perform risky network experiments. 12

13 4.4 Architectural Domain Most virtual networking projects are related to the introduction of new services. However, typically each one focuses on a particular architectural domain (e.g. management, transport, application etc.). We discuss four projects that address virtualization in the context of network management, resource management, and service composition through virtual active networks (VANs), and spawning networks Network Management: VNRMS VNRMS [71, 72, 73] is a flexible and customizable virtual network (VN) management architecture, which provides a programmable networking environment to generate multiple levels of virtual networks through nesting from a single physical network (PN). A virtual network is composed of several virtual network resources (VNRs). Each VNR is a subset of a physical network resource (PNR) in the underlying network. VNRMS lets the customers to customize the VNRs through active resource agents using a customer-based management system (CNRMS). While the provider VNRMS has access to all the resource agents, a customer can access only those that belong to its VN. In order to allow a CNRMS to manage only a subset of resources in a PNR, the management information base (MIB) of that PNR is logically partitioned into multiple disjoint MIBs, known as MIBlets [74]. MIBlets provide abstract and selective views of the resources that are allocated to a particular VN. An abstract view hides the details of the resource interface that are not relevant to the CNRMS. A selective view restricts the CNRMS to access only the resources allocated to it. These MIBlets are manipulated by the customer using SNMP [75] through CNRMS for configuration and monitoring of the VN [76] Resource Management: Darwin Darwin [77] presents a collection of customizable resource management mechanisms that support value-added services. It considers a network environment that comprises not only communication services, but storage and computation resources as well. By packaging storage/computation resources together with communication services, service providers will be able to compose sophisticated value-added services in a hierarchical fashion. It argues for customization of resource management policies along space, time and organizational constraints. Architecturally, it includes Xena [78], a high level resource broker that maps user requirements to a set of local resources, local resource managers that communicate with Xena using the Beagle [79] signaling protocol, and hierarchical scheduling disciplines based on service profiles. Xena is made programmable in a restricted fashion with a set of service delegates that provide support for active packets. Delegates can be dynamically injected into IP routers or hosts to support application specific processing and real-time management of resources. Xena expresses the resource requirements in terms of virtual networks and passes it through to Beagle. Beagle then establishes a core, based on the input from Xena, and initiates individual flow setups by the senders or receivers that rendezvous with the core in designated routers. For an individual physical resource, sharing and contention exist at multiple levels. Darwin uses the Hierarchical Fair Service Curve (H-FSC) scheduler for the purpose Virtual Active Networks: NetScript NetScript [80] is a language system for dynamically programming and deploying protocol software in an active network ( 2.2.2). It is a strongly typed language that creates universal language abstractions to capture network programmability. Unlike other active network architectures, where packets contain active programs, NetScript packets are passive. These packets are processed by protocol software or hardware when they flow through the network, as in current network model. In this architecture, active packet processing applications and standardized protocols can be composed together, interoperate, and utilize each other s services. Consequently, NetScript can be used to systematically compose, provision, and manage virtual active network abstractions [81]. NetScript consists of three integrated domain-specific language components that reside above a dataflow kernel. The packet presentation language defines the syntax of a NetScript protocol, while the composition language helps implementing the semantics of that protocol. Finally, the classification language acts as a bridge between syntax of a protocol and its semantics. These language components work together to 13

14 create a programmable stream-processing system that enables creation of arbitrary packet formats, dynamic composition of standard and active protocol, and can operate on any type of packet stream defined by the presentation language. In essence, NetScript is analogous to PostScript for printers. Just as PostScript captures the programmability of printer engines, NetScript creates a software abstraction to capture the programmability of network node functions. NetScript communication abstractions consider network nodes as collections of Virtual Network Engines (VNEs) interconnected by Virtual Links (VLs) that constitute NetScript Virtual Networks (NVNs) [82] Spawning Networks: Genesis The Genesis Kernel [83] is a spawning network [84, 85], a variant of open programmable networks, that automates the life cycle process for the creation, deployment, management and designing of network architectures. It allows multiple heterogeneous child virtual networks to operate on top of subsets of their parent s resources, and provides isolation among them. The idea is similar to spawning a child process from its parent process in the operating system literature. The Genesis Kernel also supports nesting of virtual networks and inheritance of architectural components from parent to child networks. A virtual network in the Genesis Kernel is characterized by a set of routelets interconnected by a set of virtual links. Routelets represent the lowest level of operating system support dedicated to a virtual network, and are designed to operate over a wide variety of networking technologies including IP and ATM technology. They process packets along a programmable data path at the internetworking layer, while virtual network kernel makes control algorithms support programmability. The set of virtual links create the transport environment connected by routelets. The Programming environment based on CORBA is used to control the distributed controllers across virtual networks. The virtual network life cycle process is automated comprising of four distinct phases [85]: 1) profiling, 2) spawning, 3) management, and 4) architecting. The profiling phase captures the blueprint of a network architecture in terms of a xml-based comprehensive profiling script. The spawning phase systematically sets up the topology and address space; allocates resources; and binds transport, control, and management objects to the physical network infrastructure. The management phase supports virtual network resource management [86], while the designing phase allows network designers to add, remove, or replace distributed network algorithms on-demand analyzing the pros and cons of the network design space. 4.5 Level of Virtualization To enable network virtualization, one must virtualize the nodes, the links, and every other resources in the network. The level of virtualization refers to the granularity at which each virtual network can administer itself. At one end of this spectrum, node virtualization creates virtual network by connecting virtual machines on different nodes (e.g. PlanetLab [45]). At the other end, CABO [4] proposes the concept of true plurality where each virtual network has a semblance of a native network Node Virtualization: PlanetLab PlanetLab [45, 87, 88] is an overlay-based testbed that was developed to design, evaluate, and deploy geographically distributed network services with support for researchers and users. Its goal is to create a service-oriented network architecture combining the best of both the distributed systems community and the networks community. The overlay consists of two main software components: 1) a virtual machine monitor (VMM) running on each node providing a controlled interface to abstract resources, and 2) a management service used to control the overlay. PlanetLab is built upon four design principles. First, it supports sliceability. That is, each application acquires and runs in a slice of the overlay. VMMs running on each node allocate and schedule slices of the nodes resources to create a distributed virtualized environment. Second, it supports a highly decentralized control structure, enabling nodes to act according to local policies. Third, overlay management is divided into sub-services that run on their own slices, instead of a centralized one. Finally, overlay supports an existing and widely adopted programming interface, with internal changes over time keeping the API intact, to promote actual long-term service development instead of just being a temporary testbed. 14

15 There are resource monitor and resource broker services that handle the resource management in PlanetLab. To obtain a slice a user first contacts a resource broker, then goes through admission control process in each of the nodes assigned by the broker and finally it launches its service in the resulting slice. PlanetLab currently consists of over 800 nodes at around 400 sites [45], and hundreds of research experiments have been successfully conducted over the years that prove its worth VINI VINI [46, 89] is a virtual network infrastructure allowing network researchers to evaluate their protocols and services in a realistic environment with high degree of control. It can be viewed as an extension to PlanetLab toward GENI, that will be able to provide infrastructure like PlanetLab( 4.5.1) along with the support for virtual networks as in X-Bone( 4.2.1) or VIOLIN( 4.3.4). VINI offers more latitude to researchers than PlanetLab at routing level; and provides the ability to create real complex networks, and to inject exogenous events to create more realistic alternative to simulation and emulation of proposed network architectures. To achieve realism, VINI can be placed as a middle-ground of an end-to-end Internet path. The real traffic that traverse through VINI is then used by the research experiments running on VINI. Initial prototype of VINI (PL-VINI) was implemented on PlanetLab by synthesizing a collection of available software components. It can be considered as a specific instantiation of an overlay network that runs software routers and allows multiple such overlays to exist in parallel. In particular, it used XORP for routing [90], Click for packet forwarding and network address translation [91], and OpenVPN servers to connect with end users [92]. Recently a software platform for hosting multiple virtual networks on shared physical network infrastructure, Trellis [93], has been developed. Trellis synthesizes container-based virtualization technologies together with a tunneling mechanism into a coherent platform to achieve the following design goals: performance, scalability, flexibility, and isolation. It allows each virtual network to define its custom topology, routing protocols, and forwarding tables. Initial evaluations show that virtual networks hosted on Trellis can transfer packets as fast as regular networks, and Trellis can host at least 64 such virtual networks without performance degradation GENI Based on the experience accumulated from using PlanetLab and other similar testbeds, the Global Environment for Network Innovations (GENI) [94, 95] is a major planned initiative of the US National Science Foundation (NSF) to build an open, large-scale, realistic experimental facility for evaluating new network architectures, carrying real traffic on behalf of end users, and connecting to the existing Internet to reach external sites. The purpose of GENI is to give researchers the opportunity to create customized virtual network and experiment unfettered by assumptions or requirements of the existing Internet. Main design goals of GENI [95] include: sliceability to share resources, generality to give an initial flexible platform for the researchers, fidelity, diversity and extensibility, wide deployment and user access for testing and evaluation purposes as well as actual use of deployed services and prototypes, controlled isolation and monitoring facilities. GENI proposes virtualization in the form of slices of resources in space and time. If resources are partitioned in time, a given resource might not sustain real user workload, thereby limiting its feasibility for deployment studies. On the other hand, if resources are partitioned in space, only a limited number of researchers might be able to include a given resource in their slices. In order to maintain balance, GENI proposes to use both types of virtualization based on resource type. If sufficient capacity is available to support deployment studies, GENI uses time-based slicing; otherwise, it partitions resources in space to support a handful of high priority projects instead of making those resources available to everyone Full Virtualization: CABO Current ISPs manage their network infrastructure as well as providing service to end users. Adopting a new architecture not only requires change in hardware and host software but it also requires that ISPs jointly agree on any architectural change [1]. CABO [4] is one of the very recent proposals toward network 15

16 virtualization that promotes separation between infrastructure providers and service providers to end this deadlock. CABO exploits virtualization to allow service providers to simultaneously run multiple end-toend services over equipment owned by different infrastructure providers. On one hand, CABO gives service providers direct control over the protocols and services that run on the virtual nodes and allows them to instantiate a virtual network on multi-provider infrastructure. On the other hand, it enables infrastructure providers to automatically discover and manage their physical infrastructure by running a discovery plane of their own [96]. To allow multiple virtual networks to share the same physical equipments, CABO virtualizes the nodes and the links. Virtual nodes are connected using virtual links to form a virtual network. These virtual nodes are created by the service providers and hosted by infrastructure providers equipments using a subset of available resources. Similarly, virtual links are formed from a path in the underlying physical network and include portion of the resources along the path. CABO has introduced and achieved some significant developments in terms of virtual routers and routing in virtualized networks in general. It supports automatic migration of virtual routers from one physical node to another [97] using migration technologies in the underlying virtual machines. It also proposes a new multilayer routing scheme that is scalable as well as quick to react to any changes in network conditions [98]. In supporting programmable routers, CABO resembles the theme introduced in active networks research [22, 99], except for that it does not enable users to program the network; rather service providers can customize their networks according to their need. 4.6 Summary A summary of the characteristics of the reviewed network virtualization projects is presented in Table 1. 5 Key Research Directions Most of the research works, that has been floating around for many years under the banner of network virtualization, can at best be described as attempts to fix some existing problems, rather than a conscious and focused push to build a complete network virtualization environment. As a result, several aspects of network virtualization remain unexplored till today; many others, although touched, can use further improvement. In previous sections we presented a conceptual model of the network virtualization environment, concepts closely related to its origin, and discussed some of the most notable projects in this area. Based on that discussion, here we summarize the key issues to resolve under the light of past works and provide future directions for further exploration with an objective to spark renewed research interest in this area. 5.1 Interfacing Service providers will synthesize physical infrastructure from one or more infrastructure providers to build their virtual networks. Hence, every infrastructure provider must provide a well-defined interface so that service providers can communicate with them and express their requirements. Ideally, every interface should follow a standard. Expressing a virtual network request in terms of virtual nodes, and virtual links along with their corresponding attributes can be a suitable solution. Similarly, appropriate interfaces between end users and service providers, as well as among multiple infrastructure providers, and among service providers must also be identified and standardized. Examples of such interfaces and agreements between collaborating parties can be found in the AGAVE ( 4.3.3) framework. 5.2 Signaling and Bootstrapping Before creating a virtual network, a service provider must already have network connectivity to infrastructure providers in order to issue its requests. This introduces circularity where network connectivity is a prerequisite to itself [4]. As long as the network virtualization environment is not mature enough to support itself, signaling must be handled by other means of communication, e.g. the current Internet. There must also be bootstrapping capabilities to allow service providers to customize the virtual nodes and the virtual links allocated to them to create their virtual networks. Both the requirements, i.e. signaling 16

17 Table 1: Characteristics of different network virtualization projects Architectural Networking Layer of Level of Ref. Domain Technology Virtualization Virtualization X-Bone Tempest Genesis UCLP Automating the deployment of IP overlays Enabling alternate control architectures Spawning virtual network architectures Dynamic provisioning and reconfiguration of lightpaths IP Application Node & Link [47, 48] ATM Link [52, 53] Network Node & Link [83, 84, 85] SONET Physical Link [55, 59, 60] VNET Virtual machine Grid computing Link Node [61, 62] AGAVE VIOLIN End-to-end QoS-aware service provisioning Deploying on-demand value-added services on IP overlays IP Network [3, 43, 63] IP Application Node [66, 67] VNRMS Virtual network management ATM/IP Node & Link [71, 72, 73] Darwin Integrated resource management and value-added services IP [77] NetScript Dynamic composition of services IP Network Node [80, 81] PlanetLab VINI GENI CABO Deployment and management of overlay-based testbeds Evaluating protocols and services in a realistic environment Creating customized virtual networks Deploying value-added end-to-end services on shared infrastructure IP Application Node [45, 87] Link [46, 89] Heterogeneous [94, 95] Heterogeneous Full [4] 17

18 and bootstrapping, call for at least another network that will always be present to provide connectivity to handle these issues. Genesis ( 4.4.4) and Tempest ( 4.2.2) follow this approach and provide a separate bootstrapping interface. 5.3 Accounting for Admission Control and Distributed Rate Limiting In order to uphold QoS guarantees, infrastructure providers must ensure that resources are not overbooked to service providers. Consequently, they have to perform accurate accounting and implement admission control algorithms to ensure that resources allocated to the virtual networks do not exceed the physical capacity of the underlying network. Instead of performing admission control for individual nodes or links as in the current Internet, admission control in this context must be performed on virtual networks. In order to avoid constraint violations by globally distributed virtual networks, distributed policing mechanisms must be employed to make sure that service providers cannot overflow the amount of resources allocated to them by direct or indirect means. Raghavan et al. [100] present such a global rate limiting algorithm coordinated across multiple sites in the context of cloud-based services in the existing Internet. Similar concepts need to be developed in the context of network virtualization too. 5.4 Virtual Network Embedding or Mapping Since a virtual link may span over multiple physical links, there may be many possible mappings for any given virtual network. In order to maximize the number of co-existing virtual networks it is very important to determine how to embed a service provider s request onto the physical network. But the embedding problem, with constraints on nodes and links, can be reduced to the N P-hard multi-way separator problem [101] even when all the requests are known in advance. Existing heuristic-based solutions can broadly be categorized into two major categories based on the offline and online versions of the problem they deal with. In the offline problem, all the service providers requests are known in advance. Zhu and Ammar [44] aim at achieving load balancing in the underlying physical infrastructure assuming unlimited resources. Lu and Turner [102] provide a solution for mapping only one virtual network with an aim to minimize cost. Other solutions for the offline problem based on multi-commodity flow exist in the VPN context [103, 104]. For the online problem, Fan and Ammar [105] present a solution for determining dynamic topology reconfiguration for service overlay networks with dynamic communication requirement. Zhu and Ammar [44] handle the problem by calculating the whole mapping periodically. In both solutions, it is assumed that infrastructure resource is unlimited. Yu et al. [106] take a different approach by assuming that path splitting is supported by the underlying network, and employ path migration periodically to re-optimize the utilization of the infrastructure providers resources. They also provide a modularized algorithm to optimize mapping for specific topologies. Some of the mentioned algorithms also consider admission control as an integral part of the solution. Even though various constraints and objectives make this problem computationally intractable, presence of multifarious topologies and possible opportunities to exploit them still leave enough room for research on customized solutions and newer approximation algorithms. 5.5 Resource Scheduling When establishing a virtual network, a service provider requires specific guarantees for the virtual routers attributes, as well as the virtual links bandwidth allocated to its network. For virtual routers, a service provider might request guarantees for a minimum packet processing rate of the CPU, specific disk requirements, and a lower bound on the size of the memory. On the other hand, virtual link requests may range from best-effort service to fixed loss and delay characteristics found in dedicated physical links. To provide such guarantees, and to create an illusion of an isolated and dedicated network to each service provider, infrastructure providers must employ appropriate scheduling algorithms in all of the network elements. Efficient and effective resource scheduling mechanisms become more important when resources are not statically allocated to multiple virtual networks; instead, they are dynamically distributed to increase utilization of the resources as well as the revenue of the infrastructure providers. DaVinci [107] presents such 18

19 a dynamic allocation framework where each substrate link periodically reassigns bandwidth shares between the virtual links. However, dynamic allocation gives a hint of best-effort mechanisms found in the existing Internet, and a careful investigation is required to validate such measure. Existing system virtualization technology provides scheduling mechanisms for CPU, memory, disk, and network interface in each of the VMs running on the host machine. Network virtualization can utilize these mechanisms to implement resource scheduling in the physical infrastructure. Previous results from research on packet scheduling algorithms for IP networks can also be useful in the design of schedulers. 5.6 Topology Discovery In order to allocate resources for requests from different service providers, infrastructure providers must be able to determine the topology of the networks they manage as well as the status of the corresponding network elements (i.e., physical nodes and interconnections between them). Furthermore, two adjacent infrastructure providers must also be able to establish links between their networks to enable cross-domain virtual network instantiation. UCLP ( 4.3.1) promotes a combination of event-based and periodic topology discovery using an additional topology database [59]. Here, events update the topology database of an infrastructure provider; and a periodic refresh ensures that even if some events were not notified, the topology database is fresh. CABO ( 4.5.4) argues for the use of a separate discovery plane run by the infrastructure providers as proposed in the 4D network management architecture [96]. Dissemination of gathered information in decision elements could be achieved via flooding across inter-provider links. 5.7 Virtual Nodes/Routers One of the most fundamental issues in network virtualization, if not the most, is the virtualization of the nodes that constitute the underlying physical network. Virtual routers allow multiple service providers to share same set of physical resources, and implement customized control protocols on them. Up until now, router vendors have promoted virtual routers as a tool for simplifying core network design, decreasing CAPEX, and for VPN purposes [108]. Similar concept can be extended with programmability to create substrate routers that will allow each service provider to customize their virtual routers. A conceptual construct of such substrate routers can be found in [2]. Examples of extensible and flexible virtual router architectures include Click Modular Router [91], VERA [109] etc. Performance of virtual routers on existing virtual machine systems should also be explored. Specifically, how different system virtualization techniques, e.g. full virtualization, or paravirtualization, affect the performance requires serious attention. Design and performance of virtual routers implemented on top of Xen virtual machine systems as well as the impact of current multi-core processors on their performance has been studied in [110]. Scalability of network virtualization environment is closely tied to the scalability of the physical routers used by the infrastructure providers. Commercial router vendors have already implemented routers that can hold multiple logical routers [111]. Fu and Rexford [112] present a mechanism that improves scalability by capitalizing on the commonality of address prefixes in multiple FIBs from different virtual routers to decrease memory requirements and lookup times. Research in this direction should focus on increasing the number of virtual routers any single physical router can hold. To increase network manageability, and to handle network failures to some extent, migration of virtual routers can be an effective solution [97]. But probable destinations of a migrating virtual router are restricted by some physical constraints, like change of latency, link capacity, platform compatibility issues, and even capabilities of destination physical routers. The obvious question: how to cope with these issues, remains open to be answered. 5.8 Virtual Links Virtualization of links has similar importance as virtualization of routers, in implementing virtual networks. The ability to create tunnels over multiple physical links in Layers 3, 2, or 1 already exists in the context of L3, 19

20 L2, and L1 VPNs, respectively ( 2.1). Similar protocols can be used in virtual networks too. Creating interinfrastructure provider tunnels poses a great challenge, since it will require collaboration between multiple infrastructure providers. Whether the total tunneling procedure should be done without the knowledge of infrastructure providers of the tunnels presence or should they know, is yet to be decided. Speed matters for network links. The overhead for transporting packets across a virtual link must be minimal compared to that of transporting packets across a native link. This translates into minimum encapsulation and multiplexing cost. Optical fibers can be very useful in this regard, since they can be physically sub-divided into smaller lightpaths instead of encapsulating or multiplexing packets from different virtual networks to keep them isolated. Moreover, virtual links must also be flexible enough to carry packets of any protocol. 5.9 Naming and Addressing While network virtualization provides immense flexibility in terms of creation and deployment of radical technologies, such flexibility does not come without cost. Due to the potential heterogeneity of the coexisting networks, end-to-end communication and universal connectivity in the network virtualization environment becomes a major challenge. In the network virtualization environment, it will be very hard to keep a system like DNS working due of scalability concerns and administrative issues. Same is true for addressing. Mapping between different address contexts is a well-known problem in current literature. But in the presence of different, often incompatible, addressing requirements in heterogeneous virtual networks the problem gets more complicated. Unlike the existing Internet architecture, where IP addresses carry locations as well as (weak) identifications, naming and addressing should be decoupled in the network virtualization environment so that any end user can move from one service provider to another with a single identity. If identity gets linked to the service provider, then one will not be able to change providers without losing ones identity. This problem is similar, at a higher level, to the problem of people using ISP provided addresses, who discover that they have to get new addresses as soon as they change their ISPs. In the network virtualization environment, any end user can simultaneously connect to multiple virtual networks through multiple infrastructure providers using heterogeneous technologies to access different services. We refer to this phenomena by über-homing. Any naming framework for the network virtualization environment must provide additional level of indirection to support über-homing. imark [113] is an identity management framework for the network virtualization environment that separates the identities of the end hosts from their physical and logical locations, and with the help of a global identifier space provides universal connectivity without revoking the autonomy of the concerned physical and virtual networks Dynamism and Mobility in the Network Virtualization Environment Network virtualization introduces a dynamic environment at all strata of networking, which starts from individual end users or network elements and continues up to the level of complete virtual networks. Such dynamism can broadly be categorized into two classes: 1. Macro Level Dynamism: Virtual networks providing basic services or virtual networks with shared interests can be dynamically aggregated together to create compound virtual networks. This is known as federation of VNs. Multiple federations and virtual networks can also come together to create hierarchy of virtual networks. Even though the level of dynamism is expected to be very low at this level, the complexity of adding a virtual network to a collection, or removing one, can be quite high. 2. Micro Level Dynamism: This is the more influential of the two classes discussed here and requires more attention. Micro level dynamic behavior can basically be attributed to two broad sets of activities: Dynamic join, leave, and mobility of end users within and in between virtual networks, and Dynamism incurred by the migration (i.e., mobility) of virtual routers for different purposes [97]. Mobility of the end user devices and virtual resources in the network virtualization environment can again be divided into two categories: 20

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Computer Networks. A survey of network virtualization q. N.M. Mosharaf Kabir Chowdhury a,1, Raouf Boutaba b,c, * abstract

Computer Networks. A survey of network virtualization q. N.M. Mosharaf Kabir Chowdhury a,1, Raouf Boutaba b,c, * abstract Computer Networks 54 (2010) 862 876 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet A survey of network virtualization q N.M. Mosharaf Kabir

More information

Network Virtualization: A Tutorial

Network Virtualization: A Tutorial Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012

More information

Identity Management and Resource Allocation in the Network Virtualization Environment. N.M. Mosharaf Kabir Chowdhury

Identity Management and Resource Allocation in the Network Virtualization Environment. N.M. Mosharaf Kabir Chowdhury Identity Management and Resource Allocation in the Network Virtualization Environment by N.M. Mosharaf Kabir Chowdhury A thesis presented to the University of Waterloo in fulfilment of the thesis requirement

More information

INTRODUCTION TO NETWORK VIRTUALIZATION

INTRODUCTION TO NETWORK VIRTUALIZATION 1 INTRODUCTION TO NETWORK VIRTUALIZATION Wednesday, May 14, 2008 Mosharaf Chowdhury Member, envy Project What is Virtualization? 2 Transparent abstraction of computing platform and resources Multiple logical

More information

Network Virtualization issues on Market Oriented. Eui-Nam Huh

Network Virtualization issues on Market Oriented. Eui-Nam Huh Network Virtualization issues on Market Oriented Cloud Computing Presented By Eui-Nam Huh Kyung Hee University Contents Introduction ti of Network Virtualization ti Related Projects Research Direction

More information

Network Virtualization: State of the Art and Research Challenges

Network Virtualization: State of the Art and Research Challenges 1 Network Virtualization: State of the Art and Research Challenges N.M. Mosharaf Kabir Chowdhury and Raouf Boutaba, University of Waterloo Abstract Recently network virtualization has been pushed forward

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

White Paper on NETWORK VIRTUALIZATION

White Paper on NETWORK VIRTUALIZATION White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

Network Virtualization

Network Virtualization Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services

More information

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X

How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj abhishek.bajaj@iiitb.net 2. Anargha Biswas anargha.biswas@iiitb.net 3. Ambarish Kumar ambarish.kumar@iiitb.net 4.

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Network Virtualization

Network Virtualization Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

ethernet services for multi-site connectivity security, performance, ip transparency

ethernet services for multi-site connectivity security, performance, ip transparency ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished

More information

MPLS/IP VPN Services Market Update, 2014. United States

MPLS/IP VPN Services Market Update, 2014. United States MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

WHITE PAPER. Network Virtualization: A Data Plane Perspective

WHITE PAPER. Network Virtualization: A Data Plane Perspective WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Web-Based Customer Management of VPNs

Web-Based Customer Management of VPNs Web-Based Customer Management of VPNs Raouf Boutaba 1, Walfrey Ng. 2, and Alberto Leon-Garcia 3 1 Department of Computer Science, University of Waterloo Waterloo, Ontario, N2L 3G1, Canada E-mail: rboutaba@bbcr.uwaterloo.ca

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Virtual Private Networks More, Much More than IPSec Tunnels

Virtual Private Networks More, Much More than IPSec Tunnels Virtual Private Networks More, Much More than IPSec Tunnels Glynn Rogers Networking Technologies Laboratory CSIRO ICT Centre Two Objectives of This Talk 1. Pre-empt potential confusion over the increasing

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

EVALUATING NETWORKING TECHNOLOGIES

EVALUATING NETWORKING TECHNOLOGIES WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

What Is a Virtual Private Network?

What Is a Virtual Private Network? C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Mastering Network Design with MPLS

Mastering Network Design with MPLS Mastering Network Design with MPLS Overview In this paper, enterprise CIOs, IT&T professionals and network architects will learn how to improve productivity and security by designing multi-location Virtual

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Web-based Customer Management of Virtual Private Networks

Web-based Customer Management of Virtual Private Networks Web-based Customer Management of Virtual Private Networks Raouf Boutaba 1, Walfrey Ng. 2, and Alberto Leon-Garcia 3 1 Department of Computer Science, University of Waterloo Waterloo, Ontario, N2L 3G1,

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

Analysis of Network Segmentation Techniques in Cloud Data Centers

Analysis of Network Segmentation Techniques in Cloud Data Centers 64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

A lightweight Approach for Viable End-to-end IP-based QoS Services

A lightweight Approach for Viable End-to-end IP-based QoS Services A lightweight Approach for Viable End-to-end IP-based QoS Services Óscar González de Dios, Telefónica I+D, Spain 1st FP7 Networked Media Concertation meeting, 17th April, Vilamoura Slide 1 Overview of

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

DREAMER and GN4-JRA2 on GTS

DREAMER and GN4-JRA2 on GTS GTS Tech+Futures Workshop (Copenhagen) GTS Tech+Futures Workshop (Copenhagen) DREAMER and GN4-JRA2 on GTS CNIT Research Unit of Rome University of Rome Tor Vergata Outline DREAMER (Distributed REsilient

More information

Datacom Services Description and their applications

Datacom Services Description and their applications Datacom Services Description and their applications What is data communication services? Data communication ( datacom ) is range of services that will help organise communication and data exchange between

More information

Part2: Lecture 03! Network Virtualization and SDNs!

Part2: Lecture 03! Network Virtualization and SDNs! Part2: Lecture 03! Network Virtualization and SDNs! Last time(s)?! Optical nets! Spectrum! Multiplexing! NSA/NSI! Lightpaths! NDL: network topology description! ! Connection provisioning! What do optical

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

Building integrated services intranets

Building integrated services intranets Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4

More information

Introduction to Meg@POP

Introduction to Meg@POP Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple

More information

Performance Management for Next- Generation Networks

Performance Management for Next- Generation Networks Performance Management for Next- Generation Networks Definition Performance management for next-generation networks consists of two components. The first is a set of functions that evaluates and reports

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

LoopStar 700. Next Generation Ethernet Access and Transport Solutions

LoopStar 700. Next Generation Ethernet Access and Transport Solutions LoopStar 700 Next Generation Ethernet Access and Transport Solutions The LoopStar 700 Product Family The LoopStar 700 product family delivers all efficiently consolidate all services onto a the features

More information

SINET3 for Grid Environments (New Japanese Academic Backbone Network)

SINET3 for Grid Environments (New Japanese Academic Backbone Network) SINET3 for Grid Environments (New Japanese Academic Backbone Network) M. Koibuchi, M. Nakao, and NW groupers National Institute of Informatics (NII), JAPAN 1 2 Evolution of Japanese Academic Networks SINET3

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

GENI Network Virtualization Concepts

GENI Network Virtualization Concepts GENI Network Virtualization Concepts Alexander Gall 22.2.2007 EFNI Workshop, Amsterdam 2007 SWITCH The GENI initiative GENI: Global Environment for Network Innovations. Initiative planned

More information

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Implementing VoIP support in a VSAT network based on SoftSwitch integration Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.

More information